LW-VEN Requirements and Limitations
This section covers the LW-VEN's setup operations, requirements, limitations, and caveats.
The LW-VEN software installs the Illumio Legacy Windows VEN Service on your supported legacy Windows machines. Once installed, the Illumio Legacy Windows VEN Service:
Enforces policy received from the PCE.
Consumes CPU as needed to calculate or optimize and apply the firewall while remaining idle in the background as much as possible.
You control the Illumio Legacy Windows VEN Service's operations through the PCE web console or from the command line on the Windows machine on which the LW-VEN is installed.
Set-up Sequence
When run, the Illumio Legacy Windows VEN Service automatically does the following:
Checks whether this solution is supported.
Installs and pairs an LW-VEN on your legacy Windows Servers.
Creates a workload on the PCE to represent your legacy Windows Servers as a managed workload. A secured workload is known as a managed workload.
When running, the service:
Requests policy from the PCE as follows: after the LW-VEN sends a heartbeat to the PCE every five minutes, if there are any policy updates, the LW-VEN requests them from the PCE. If there are no policy updates, the LW-VEN performs a tamper check on its local policy to ensure that it hasn't been changed.
Applies the Illumio firewall rules obtained from the PCE to the Windows workload.
If the Illumio Legacy Windows VEN Service fails, Windows restarts it automatically.
Requirements
IllumioLWVENInstaller.exe
Illumio Policy Compute Engine (PCE) release 23.2.20 or later.
32-bit or 64-bit Microsoft Windows Server 2003 Service Pack 1 & Service Pack 2 and Windows 2008 Service Pack 1 & Service Pack 2
.NET Framework 4.0.0 (minimum required; versions 5.0 and later are not supported.)
A dedicated local user account with admin privileges for installing and modifying the Windows firewall, running the service, and issuing the
illumio-lwven-ctl
commands.Important
You must disable the User Access Control (UAC) feature if it is enabled on the legacy Windows Server machines on which you plan to install the Illumio Legacy Windows VEN Service. Otherwise, you will not be able to install the LW-VEN on the machine. UAC is a Windows security feature that prevents unauthorized changes to the operating system.
When sending requests to the PCE the LW-VEN performs peer certificate validation by validating the certificate against the generally available cert.pem file provided in the Illumio LW-VEN Service
\certs
directory. If you need to add extra certificate validations, add the appropriate .pem files to the\certs
directory before activating the LW-VEN.By default, this solution doesn't collect flow information. To enable flow collection, you must configure FlowLink as described in Flowlink Configuration and Usage Guide, "Flowlink Configuration."
Limitations and Caveats
Take careful note of the following limitations and caveats.
Item | Windows 2003 Server SP1 & SP2 | Windows 2008 Server SP1 & SP2 |
---|---|---|
Enforcement modes | Support for:
If you change the Enforcement Mode from Full to Idle, the Illumio Legacy Windows VEN Service removes all Illumio policy from the Windows server. If you switch back to Full enforcement, the policy is reapplied to the workload. Although the Visibility and Selective options are not supported with Win 2003 SP1/SP2 servers, the options still appear in the PCE UI in the Enforcement drop-down menu on each Workload's details page. If you change the Enforcement mode from Full to Visibility or Selective, the LW-VEN ignores the policy and logs an event to the Windows Event Log and the PCE. | Support for:
If you change the Enforcement Mode from Full to Visibility or Selective, the PCE creates an Illumio ALLOW ALL rule, effectively allowing all non-blocked traffic. NoteIn Selective Enforcement mode, the Windows 2008 Server firewall applies all block rules before applying any allow rules. This behavior is opposite to how the standard Illumio VEN works on other Windows systems. |
Visibility, Flow logs | By default, this solution doesn't collect flow information. To enable flow collection, you can configure Flowlink. For more information, see the Flowlink Configuration and Usage Guide. | |
Inbound/Outbound Rules | Support for:
| Support for:
|
Policy Rules Limitations | Support for:
| Support for:
|
Matching rules |
|
|
Rule character limits | Windows limits the size of rules to approximately 8K characters. Rules that exceed 8K characters will cause the entire policy to be rejected and a message to be logged in the Window's Event Log. | Windows limits the size of rules to approximately 8K characters. Rules that exceed 8k characters are split into multiple rules. No limit on the number of rules is enforced. |
Error handling | Log messages are written to local logs; errors and warnings are also written to the Windows Event Log and to the PCE. | |
LW-VEN and workload names in the PCE | After you activate an LW-VEN, the LW-VEN workload appears in the PCE UI with the same name as the Server's hostname. | |
User interface |
|